Academic literature on the topic 'Host impersonation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Host impersonation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Host impersonation"

1

Dandotiya, Monika. "A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 3044–53. http://dx.doi.org/10.22214/ijraset.2022.42176.

Full text
Abstract:
Abstract: Currently, the Internet is playing a vital role in educating students to boost industrial production. Various network components are employed to give a wide range of options and reliability for internet services. As the Internet continues to develop and expand, network security has become an issue. Many attempts to secure transmission at the application, transport, or network layers have failed because the data connection layer has not been appropriately managed. The DHCP and ARP protocols are critical to the network's ability to function correctly. They were not designed with securi
APA, Harvard, Vancouver, ISO, and other styles
2

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issue
APA, Harvard, Vancouver, ISO, and other styles
3

Khalid, Haqi, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, and Muhammad Akmal Chaudhary. "Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform Using IoT-Based Wireless Medical Sensor Network." Electronics 10, no. 7 (2021): 790. http://dx.doi.org/10.3390/electronics10070790.

Full text
Abstract:
Several wireless devices and applications can be connected through wireless communication technologies to exchange data in future intelligent health systems (e.g., the Internet of Medical Things (IoMT)). Smart healthcare requires ample bandwidth, reliable and effective communications networks, energy-efficient operations, and quality of service support (QoS). Healthcare service providers host multi-servers to ensure seamless services are provided to the end-users. By supporting a multi-server environment, healthcare medical sensors produce many data transmitted via servers, which is impossible
APA, Harvard, Vancouver, ISO, and other styles
4

AYO-OLADAPO, ESTHER OLAJUMOKE, and John Ayo Oladapo. "Parenting Education As A Vital Tool For Sustaining Green Skills Among Youths For Nation Building." Shodh Sari-An International Multidisciplinary Journal 02, no. 04 (2023): 207–21. http://dx.doi.org/10.59231/sari7635.

Full text
Abstract:
This study examined the efficacy of parenting education in developing and sustaining green skills for youth to foster sustainable nation-building. Parenting education provides a platform that individual youth can use to acquire green skills with the right attitude, knowledge, and values necessary for workforce in a knowledge economy to build a sustainable nation in the contemporary time. In contemporary times, parental education inculcates diverse range of home training and skills development in the youth, enabling them to express self-capabilities to drive sustainability, innovation, and gree
APA, Harvard, Vancouver, ISO, and other styles
5

Dr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Ladde Akash, Jadhav Rohan, and Dani Rajrajeshwari. "A Decentralized Security Strategy to Counter ARP Cache Poisoning Attacks." Advancement and Research in Instrumentation Engineering 8, no. 2 (2025): 6–12. https://doi.org/10.5281/zenodo.15542613.

Full text
Abstract:
<em>The Address Resolution Protocol (ARP) plays a vital role in the Internet protocol suite, but it lacks built-in security features, particularly in verifying the legitimacy of ARP replies. This vulnerability allows attackers to inject fake ARP messages into a Local Area Network (LAN), thereby corrupting the ARP cache of targeted devices. Successful ARP spoofing can enable attackers to carry out man-in-the-middle (MITM) attacks intercepting or altering data or even launch denial-of-service (DoS) attacks. Therefore, identifying and preventing ARP cache poisoning is essential. While several stu
APA, Harvard, Vancouver, ISO, and other styles
6

Ilham Firdaus, Januar Al Amien, and Soni Soni. "String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort." Jurnal CoSciTech (Computer Science and Information Technology) 1, no. 2 (2020): 44–49. http://dx.doi.org/10.37859/coscitech.v1i2.2180.

Full text
Abstract:
Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi suc
APA, Harvard, Vancouver, ISO, and other styles
7

Mahmood, Baban Ahmed, Aso Ahmed Majeed, and Ahmed Chalak Shakir. "An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1193. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1193-1200.

Full text
Abstract:
&lt;p&gt;The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the
APA, Harvard, Vancouver, ISO, and other styles
8

Mahmood, Baban Ahmed, Aso Ahmed Majeed, and Ahmed Chalak Shakir. "An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1193–200. https://doi.org/10.11591/ijeecs.v21.i2.pp1193-1200.

Full text
Abstract:
The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantag
APA, Harvard, Vancouver, ISO, and other styles
9

Arkhangelskaya, Irina. "Donald Trump in US Show Saturday Night Live (1988-2022)." Theoretical and Practical Issues of Journalism 11, no. 3 (2022): 545–63. http://dx.doi.org/10.17150/2308-6203.2022.11(3).545-563.

Full text
Abstract:
The author analyzed episodes of the US late-night comedy show Saturday Night Live (SNL, 1988–2022), in which Donald Trump appeared as an object of parody, a host or comedy sketch participant. The goal of the research was to define how comedy modus as well as images of Trump-businessman and Trump-politician changed, what messages the comedians sent to the public. We conducted a content-analysis of video materials, academic and media publications, and interviews with students from Linguistics University of Nizhny Novgorod and Lobachevski State University of Nizhny Novgorod, who watched SNL not l
APA, Harvard, Vancouver, ISO, and other styles
10

Boler, Megan. "The Transmission of Political Critique after 9/11: “A New Form of Desperation”?" M/C Journal 9, no. 1 (2006). http://dx.doi.org/10.5204/mcj.2595.

Full text
Abstract:
&#x0D; &#x0D; &#x0D; Investigative journalist Bill Moyers interviews Jon Stewart of The Daily Show:&#x0D; MOYERS: I do not know whether you are practicing an old form of parody and satire…or a new form of journalism.&#x0D; STEWART: Well then that either speaks to the sad state of comedy or the sad state of news. I can’t figure out which one. I think, honestly, we’re practicing a new form of desperation….&#x0D; July 2003 (Bill Moyers Interview of Jon Stewart, on Public Broadcasting Service)&#x0D; &#x0D; &#x0D; Transmission, while always fraught and ever-changing, is particularly so at a moment
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Host impersonation"

1

Si, Huayin, and Chang-Tsun Li. "Copyright Protection in Virtual Communities through Digital Watermarking." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch257.

Full text
Abstract:
Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount
APA, Harvard, Vancouver, ISO, and other styles
2

Si, Huayin, and Chang-Tsun Li. "Copyright Protection in Virtual Communities through Digital Watermarking." In Virtual Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-955-7.ch098.

Full text
Abstract:
Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!